Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2133 Full-Text Articles 2389 Authors 523022 Downloads 99 Institutions

All Articles in Software Engineering

Faceted Search

2133 full-text articles. Page 6 of 69.

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held 2016 The University of Western Ontario

Analysis Of 3d Cone-Beam Ct Image Reconstruction Performance On A Fpga, Devin Held

Electronic Thesis and Dissertation Repository

Efficient and accurate tomographic image reconstruction has been an intensive topic of research due to the increasing everyday usage in areas such as radiology, biology, and materials science. Computed tomography (CT) scans are used to analyze internal structures through capture of x-ray images. Cone-beam CT scans project a cone-shaped x-ray to capture 2D image data from a single focal point, rotating around the object. CT scans are prone to multiple artifacts, including motion blur, streaks, and pixel irregularities, therefore must be run through image reconstruction software to reduce visual artifacts. The most common algorithm used is the Feldkamp, Davis, and ...


The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard 2016 Carnegie Mellon University

The Quelce Method: Using Change Drivers To Estimate Program Costs, Sarah Sheard

Software Engineering Institute

Problems with cost estimation, ranging from estimator overconfidence to unintegrated tools, result in potentially billions of dollars of unanticipated expenses for Department of Defense programs. Quantifying Uncertainty in Early Lifecycle Cost Estimation (QUELCE), developed by the Carnegie Mellon University Software Engineering Institute, is a method for estimating potential program costs in a way that acknowledges and uses uncertainty that occurs early in the development lifecycle. This report first familiarizes the reader with the QUELCE method. QUELCE computes a distribution of program costs based on Monte Carlo analysis of program cost drivers—assessed via analyses of dependency structure matrices and Bayesian ...


Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi 2016 The University of Western Ontario

Regulatory Compliance-Oriented Impediments And Associated Effort Estimation Metrics In Requirements Engineering For Contractual Systems Engineering Projects, Md Rashed I. Nekvi

Electronic Thesis and Dissertation Repository

Large-scale contractual systems engineering projects often need to comply with a myriad of government regulations and standards as part of contractual fulfillment. A key activity in the requirements engineering (RE) process for such a project is to elicit appropriate requirements from the regulations and standards that apply to the target system. However, there are impediments in achieving compliance due to such factors as: the voluminous contract and its high-level specifications, large number of regulatory documents, and multiple domains of the system. Little empirical research has been conducted on developing a shared understanding of the compliance-oriented complexities involved in such projects ...


Win Nim, Anna Carrigan 2016 University of Wyoming

Win Nim, Anna Carrigan

Honors Theses AY 16/17

A discussion of two-person zero-sum games in combinatorial game theory along with documentation of the software development process for creating an Android application that solves the game of Nim.

Repository for the software development process is located at https://github.com/annamooseity/nim


Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma 2016 University of Arkansas, Fayetteville

Just In Time Assembly (Jita) - A Run Time Interpretation Approach For Achieving Productivity Of Creating Custom Accelerators In Fpgas, Sen Ma

Theses and Dissertations

The reconfigurable computing community has yet to be successful in allowing programmers to access FPGAs through traditional software development flows. Existing barriers that prevent programmers from using FPGAs include: 1) knowledge of hardware programming models, 2) the need to work within the vendor specific CAD tools and hardware synthesis. This thesis presents a series of published papers that explore different aspects of a new approach being developed to remove the barriers and enable programmers to compile accelerators on next generation reconfigurable manycore architectures. The approach is entitled Just In Time Assembly (JITA) of hardware accelerators. The approach has been defined ...


Update 2016: Considerations For Using Agile In Dod Acquisition Has Been Cleared For Open Publication By The Office Of Security Review, Suzanne Garcia-Miller, Dan Ward, Mary Ann Lapham, Ray Williams, Charles (Bud) Hammons, Daniel Burton, Alfred R. Schenker 2016 Carnegie Mellon University

Update 2016: Considerations For Using Agile In Dod Acquisition Has Been Cleared For Open Publication By The Office Of Security Review, Suzanne Garcia-Miller, Dan Ward, Mary Ann Lapham, Ray Williams, Charles (Bud) Hammons, Daniel Burton, Alfred R. Schenker

Software Engineering Institute

This report, an update to a 2010 report, Considerations For Using Agile In DoD Acquisitions, addresses developments in commercial Agile practices as well as the Department of Defense (DoD) acquisition environment. It covers some previously unanswered questions and asks some new ones. It includes new research, examples of Agile in practice, and policy updates.

Continuing with the 2010 report’s theme, this report updates the exploration of these questions: Can Agile be used in the DoD environment? If so, how? It includes lessons learned from DoD programs that have employed Agile and information gleaned from myriad articles and books on ...


The Critical Role Of Positive Incentives For Reducing Insider Threats, Andrew P. Moore, Jeff Savinda, Elizabeth Monaco, Jamie Moyes, Denise Rousseau, Sam Perl, Jennifer Cowley, Matthew Collins, Tracy Cassidy, Nathan VanHoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall 2016 Carnegie Mellon University

The Critical Role Of Positive Incentives For Reducing Insider Threats, Andrew P. Moore, Jeff Savinda, Elizabeth Monaco, Jamie Moyes, Denise Rousseau, Sam Perl, Jennifer Cowley, Matthew Collins, Tracy Cassidy, Nathan Vanhoudnos, Palma Buttles-Valdez, Daniel Bauer, Allison Parshall

Software Engineering Institute

Traditional insider threat practices involve negative incentives that attempt to force employees to act in the interests of the organization and, when relied on excessively, can result in negative unintended consequences that exacerbate insider threats. Positive incentives that attempt to encourage employees to act in the interests of the organization can complement negative incentives. In our research, we identified and analyzed three avenues for aligning the interests of the employee and the organization: job engagement, perceived organizational support, and connectedness with co-workers. Based on an analysis of three insider threat incidents and an exploratory survey of organizations, we developed a ...


Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell 2016 Carnegie Mellon University

Scaling Agile Methods For Department Of Defense Programs, William Hayes, Mary Ann Lapham, Suzanne Garcia-Miller, Eileen Wrubel, Peter Capell

Software Engineering Institute

Most introductory discussions of Agile software development have focused on team management concepts and the implications of the Agile Manifesto for a single, small team. The focus now includes scaling these concepts for a variety of applications. The context in which Agile methods are employed drives important choices for how the work is done. Published frameworks and commercial training available in the market offer a variety of solutions for scaling Agile. This report addresses what is meant by scaling, contextual drivers for implementation choices, and the frameworks available for use today.


Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky 2016 Rochester Institute of Technology

Teaching Android Security Through Examples: A Publicly Available Database Of Vulnerable Apps, Daniel E. Krutz, Samuel A. Malachowsky

Articles

Security is hard, and teaching security can be even harder. Here we describe a public educational activity to assist in the instruction of both students and developers in creating secure Android apps. Our set of activities includes example vulnerable applications, information about each vulnerability, steps on how to repair the vulnerabilities, and information about how to confirm that the vulnerability has been properly repaired. Our primary goal is to make these activities available to other instructors for use in their classrooms ranging from the K-12 to university settings. A secondary goal of this project is to foster interest in security ...


Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu 2016 University of Nebraska-Lincoln

Semeo: A Semantic Equivalence Analysis Framework For Obfuscated Android Applications, Zhen Hu

Computer Science and Engineering: Theses, Dissertations, and Student Research

Software repackaging is a common approach for creating malware. In this approach, malware authors inject malicious payloads into legitimate applications; then, to ren- der security analysis more difficult, they obfuscate most or all of the code. This forces analysts to spend a large amount of effort filtering out benign obfuscated methods in order to locate potentially malicious methods for further analysis. If an effective mechanism for filtering out benign obfuscated methods were available, the number of methods that must be analyzed could be reduced, allowing analysts to be more productive. In this thesis, we introduce SEMEO, a highly effective and ...


Using Software Testing Techniques To Infer Biological Models, Mikaela Cashman 2016 University of Nebraska-Lincoln

Using Software Testing Techniques To Infer Biological Models, Mikaela Cashman

Computer Science and Engineering: Theses, Dissertations, and Student Research

Years of research in software testing has given us novel ways to reason about and test the behavior of complex software systems that contain hundreds of thousands of lines of code. Many of these techniques have been inspired by nature such as genetic algorithms, swarm intelligence, and ant colony optimization. However, they use a unidirectional analogy – taking from nature without giving back.

In this thesis we invert this view and ask if we can utilize techniques from testing and modeling of highly-configurable software systems to aid in the emerging field of systems biology which aims to model and predict the ...


Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan 2016 California Polytechnic State University, San Luis Obispo

Implementation And Testing Of A Book Lookup System For The Robert E. Kennedy Library, Casey C. Sheehan

Computer Science

The goal of this senior project centered around improving the quality of student and teacher experiences when visiting the library. The task of finding a book amongst the shelves is an arduous one, which I felt could be improved upon through implementation and testing of a Book Lookup system for the Cal Poly Robert E. Kennedy Library. Development for this project was done using a Python framework. Testing and earlier designs were also created using JavaScript and PHP. Repeated tests were conducted on the accuracy of the software and its ability to decrease user search-time when compared to conventional methods.


Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell 2016 California Polytechnic State University, San Luis Obispo

Android Drone: Remote Quadcopter Control With A Phone, Aubrey John Russell

Computer Engineering

The purpose of the “Android Drone” project was to create a quadcopter that can be controlled by user input sent over the phone’s Wi-Fi connection or 4G internet connection. Furthermore, the purpose was also to be able to receive live video feedback over the internet connection, thus making the drone an inexpensive option compared to other, equivalent drones that might cost thousands of dollars. Not only that, but the Android phone also has a host of other useful features that could be utilized by the drone: this includes GPS, pathing, picture taking, data storage, networking and TCP/IP, a ...


Ios Application For Inventory In Small Retail Stores, Andrea Savage 2016 California Polytechnic State University, San Luis Obispo

Ios Application For Inventory In Small Retail Stores, Andrea Savage

Computer Science

Currently, small retail stores with low technology budgets such as those right here in San Luis Obispo are struggling to integrate new technologies into their companies. This mobile application built for iOS with a Firebase backend is seeking to remove their barriers to entry. I built this application to give small retail stores a customizable application that allows them to display products electronically to customers and maintain accurate inventory both in one place. The construction of this application hinged around three major design decisions: UI design of the color management views, organization of the database, and accessing the database with ...


Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work 2016 University of Tennessee, Knoxville / Oak Ridge National Laboratory

Context-Sensitive Auto-Sanitization For Php, Jared M. Smith, Richard J. Connor, David P. Cunningham, Kyle G. Bashour, Walter T. Work

University of Tennessee Honors Thesis Projects

No abstract provided.


Security Testing With Misuse Case Modeling, Samer Yousef Khamaiseh 2016 Boise State University

Security Testing With Misuse Case Modeling, Samer Yousef Khamaiseh

Boise State University Theses and Dissertations

Having a comprehensive model of security requirements is a crucial step towards developing a reliable software system. An effective model of security requirements which describes the possible scenarios that may affect the security aspects of the system under development can be an effective approach for subsequent use in generating security test cases.

Misuse case was first proposed by Sinder and Opdahl as an approach to extract the security requirements of the system under development [1]. A misuse case is a use case representing scenarios that might be followed by a system adversary in order to compromise the system; that is ...


D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju WANG, Jie XIONG, Hongbo JIANG, Xiaojiang CHEN, Dingyi FANG 2016 Singapore Management University

D-Watch: Embracing "Bad" Multipaths For Device-Free Localization With Cots Rfid Devices, Ju Wang, Jie Xiong, Hongbo Jiang, Xiaojiang Chen, Dingyi Fang

Research Collection School Of Information Systems

Device-free localization, which does not require any device attached to the target is playing a critical role in many applications such as intrusion detection, elderly monitoring, etc. This paper introduces D-Watch, a device-free system built on top of low cost commodity-off-the-shelf (COTS) RFID hardware. Unlike previous works which consider multipaths detrimental, D-Watch leverages the "bad" multipaths to provide a decimeter level localization accuracy without offline training. D-Watch harnesses the angle-of-arrival (AoA) information from the RFID tags' backscatter signals. The key intuition is that whenever a target blocks a signal's propagation path, the signal power experiences a drop which can ...


Collective Personalized Change Classification With Multiobjective Search, Xin XIA, David LO, Xinyu WANG, Xiaohu YANG 2016 Singapore Management University

Collective Personalized Change Classification With Multiobjective Search, Xin Xia, David Lo, Xinyu Wang, Xiaohu Yang

Research Collection School Of Information Systems

Many change classification techniques have been proposed to identify defect-prone changes. These techniques consider all developers' historical change data to build a global prediction model. In practice, since developers have their own coding preferences and behavioral patterns, which causes different defect patterns, a separate change classification model for each developer can help to improve performance. Jiang, Tan, and Kim refer to this problem as personalized change classification, and they propose PCC+ to solve this problem. A software project has a number of developers; for a developer, building a prediction model not only based on his/her change data, but also ...


Demystifying And Puncturing The Inflated Delay In Smartphone-Based Wifi Network Measurement, Weichao LI, WU, DAOYUAN, Rocky K. C. CHANG, Ricky K. P. MOK 2016 Singapore Management University

Demystifying And Puncturing The Inflated Delay In Smartphone-Based Wifi Network Measurement, Weichao Li, Wu, Daoyuan, Rocky K. C. Chang, Ricky K. P. Mok

Research Collection School Of Information Systems

Using network measurement apps has become a very effective approach to crowdsourcing WiFi network performance data. However, these apps usually measure the user-level performancemetrics instead of the network-level performance which is important for diagnosing performance problems. In this paper we report for the first time that a major source of measurement noises comes from the periodical SDIO (Secure Digital Input Output) bus sleep inside the phone. The additional latency introduced by SDIO and Power Saving Mode can inflate and unstablize network delay measurement significantly. We carefully design and implement a scheme to wake up the phone for delay measurement by ...


Careermapper: An Automated Resume Evaluation Tool, Vivian LAI, Kyong Jin SHIM, Richard Jayadi OENTARYO, Philips Kokoh PRASETYO, Casey VU, Ee-peng LIM, David LO 2016 Singapore Management University

Careermapper: An Automated Resume Evaluation Tool, Vivian Lai, Kyong Jin Shim, Richard Jayadi Oentaryo, Philips Kokoh Prasetyo, Casey Vu, Ee-Peng Lim, David Lo

Research Collection School Of Information Systems

The advent of the Web brought about major changes in the way people search for jobs and companies look for suitable candidates. As more employers and recruitment firms turn to the Web for job candidate search, an increasing number of people turn to the Web for uploading and creating their online resumes. Resumes are often the first source of information about candidates and also the first item of evaluation in candidate selection. Thus, it is imperative that resumes are complete, free of errors and well-organized. We present an automated resume evaluation tool called 'CareerMapper'. Our tool is designed to conduct ...


Digital Commons powered by bepress